C++ Toast No Need Jni Method.h
6.4 KB
AantikToast – C++ Toast Without Any JNI Methods
AantikToast() is a simple and elegant C++ function that lets you show Android Toast messages directly from native code no extra Java methods, no messy JNI bridges, and no unnecessary boilerplate It works smoothly with just JNIEnv* and a jobject context.
And yeah… some people tried to use this same context to show dialogs 😂
+ Java developer understand this point ---[]
But listen Android has many different types of contexts and this one is ONLY meant for showing Toasts. Don’t try anything else with it
AantikToast() is a simple and elegant C++ function that lets you show Android Toast messages directly from native code no extra Java methods, no messy JNI bridges, and no unnecessary boilerplate It works smoothly with just JNIEnv* and a jobject context.
And yeah… some people tried to use this same context to show dialogs 😂
+ Java developer understand this point ---[]
But listen Android has many different types of contexts and this one is ONLY meant for showing Toasts. Don’t try anything else with it
❤14👀3🤓2
Color.h
1 KB
Color.hColor ColourSky = Color::red();
bool SkyBox = true;
// SkyBix Pointer instance
void (*set_Skybox)(void *instance);
// color Pointer instance
void (*set_Color)(void *instance, Color value);
// Main Pointer instance
void (*old_BackgroundUpdate)(void *instance);
void BackgroundUpdate(void *instance)
{
if (instance != NULL && SkyBox)
{
// Main Pointer instance
void *classMaterial = *(void**)((uint64_t)instance + 0x14);
//public class BackgroundController
// private Material _DepthMaterial; // 0x14
set_Skybox(classMaterial);
if
(classMaterial != NULL)
{
set_Color(classMaterial, Color(ColourSky));
}
//SkyBox = false;
}
return old_BackgroundUpdate(instance);
}
case 1:
SkyBox = boolean;
break;
case 3:
switch (value) {
case 0:
ColourSky = Color::red();
break;
case 1:
ColourSky = Color::green();
break;
case 2:
ColourSky = Color::blue();
break;
case 3:
ColourSky = Color::black();
break;
case 4:
ColourSky = Color::purple();
break;
case 5:
ColourSky = Color::yellow();
break;
case 6:
ColourSky = Color::magenta();
break;
case 7:
ColourSky = Color::grey();
break;
case 8:
ColourSky = Color::white();
break;
default:
ColourSky.setRGBA(0.5f, 0.5f, 0.5f, 1.0f); // Default grey
break;
OBFUSCATE("1_Toggle_Enable Sky Colour"),
OBFUSCATE("3_Spinner_Sky Color_Default,Green,Blue,Black,Purple,Yellow,Magenta,Grey,White"), //3 Case
set_Skybox = (void (*)(void *))getAbsoluteAddress(targetLibName, 0x30BF8B4);
//public sealed class RenderSettings
//public static void set_skybox(Material value) { }
set_Color = (void (*)(void *, Color))getAbsoluteAddress(targetLibName, 0x30C5968);
//public class Material
//public void set_color(Color value) { }
HOOK_LIB("libil2cpp.so", "0xDAFBCC", BackgroundUpdate, old_BackgroundUpdate);
//public class BackgroundController
//private void LateUpdate() { }
subway surfers Sky Color Hook
Dev - @aantik_mods
❤🔥7❤3👌2
package io.flutter.plugin.common;
import io.flutter.plugin.common.l;
public interface l$c {
void onMethodCall(k kVar, l.d dVar);
}
Flutter Modder Only Understand this 😂👍
😍8❤4🥰1
Android Native Library Protection Project
by @aantik_mods
I am working on a new system that protects Android native libraries .so files in a safe way.
The goal is simple: the app will run normally, but the library file will look completely changed when someone tries to open it.The protector does not touch any important parts of the ELF file.It keeps .text, PT_LOAD, entry point, GOT/PLT, dynamic table and all runtime data safe.
So the library never crashes inside the app.The changes happen only in non-critical areas.
The tool adds many junk sections, splits rodata into many parts, changes section names, adds fake text blocks, increases alignment and mixes the order of sections.Because of this, the full library looks different from the original one.If anyone opens both files in a hex viewer or diff tool, every part looks changed.IDA and Ghidra also get confused because the layout becomes very chaotic, but the real code still works normally.This project is made to slow down reverse engineering while keeping the app 100% stable.
More updates and improvements will come soon
🔫 Lib compare or copycat public gone soon No need any CUSTOM Lib loader
by @aantik_mods
I am working on a new system that protects Android native libraries .so files in a safe way.
The goal is simple: the app will run normally, but the library file will look completely changed when someone tries to open it.The protector does not touch any important parts of the ELF file.It keeps .text, PT_LOAD, entry point, GOT/PLT, dynamic table and all runtime data safe.
So the library never crashes inside the app.The changes happen only in non-critical areas.
The tool adds many junk sections, splits rodata into many parts, changes section names, adds fake text blocks, increases alignment and mixes the order of sections.Because of this, the full library looks different from the original one.If anyone opens both files in a hex viewer or diff tool, every part looks changed.IDA and Ghidra also get confused because the layout becomes very chaotic, but the real code still works normally.This project is made to slow down reverse engineering while keeping the app 100% stable.
More updates and improvements will come soon
Please open Telegram to view this post
VIEW IN TELEGRAM
❤7👌5😍2
Media is too big
VIEW IN TELEGRAM
😣 The internal stub.a is embedded. I’m aware that some developers try to dump process memory to recover the original lib.so, but for my scenario this approach is not feasible
1❤7❤🔥2😍1
Media is too big
VIEW IN TELEGRAM
Google加固 Apks split vdex Injection Objectlogger
Main idea Directly inject the ObjectLogger into base_split1.vdex.
✅ No need to replace base.apk
✅ No need to manually add ObjectLogger
✅ Works with paired APKs
😁 No need to convert APKs or edit the APK files at all
Main idea Directly inject the ObjectLogger into base_split1.vdex.
✅ No need to replace base.apk
✅ No need to manually add ObjectLogger
✅ Works with paired APKs
😁 No need to convert APKs or edit the APK files at all
🤓15❤🔥8👀5
lib(so) control flow BETA.apk
19.5 MB
lib.so obfuscation tools
FEATURE ---[/]
LZMA ultra compression
Custom stub injection
Fake segments
Section confusion
Dynamic table shred
Extra anti-Ghidra patch
Anti-Frida optimized
For ARM64 APK, you must enable this option before patching with Android Shield
Author - @RevDex
Dev - @aantik_mods
FEATURE ---[/]
LZMA ultra compression
Custom stub injection
Fake segments
Section confusion
Dynamic table shred
Extra anti-Ghidra patch
Anti-Frida optimized
For ARM64 APK, you must enable this option before patching with Android Shield
Author - @RevDex
Dev - @aantik_mods
🤯12❤8😍5
ЯevDex
lib(so) control flow BETA.apk
Bro I didn’t get any comments from anyone. please let me know what’s going on. at least give me one feedback is it working or not? And tell me which part needs improvement
🤔I guess 90% of them are my haters that’s why no one is giving any feedback
🤔I guess 90% of them are my haters that’s why no one is giving any feedback
🤓7🤯3👀2
hijack okhttp3 @aantik_mods.zip
2.4 KB
Api response hijack
🐛 watcher
🐛 overwriter
Tutorial soon 😁👍
Modded by @RevDex
Dev - @aantik_mods
https://www.youtube.com/watch?v=s3O8Ek50Bu0
🐛 watcher
🐛 overwriter
Tutorial soon 😁👍
Modded by @RevDex
Dev - @aantik_mods
https://www.youtube.com/watch?v=s3O8Ek50Bu0
❤12
MenaVpn hijack system injected mod.apk
58.9 MB
Modded by @RevDex
Tutorial: https://www.youtube.com/watch?v=s3O8Ek50Bu0
This is a React Native app, but the OkHttp3 system says I don’t care, bro. 😁🤡🤦
Tutorial: https://www.youtube.com/watch?v=s3O8Ek50Bu0
This is a React Native app, but the OkHttp3 system says I don’t care, bro. 😁🤡🤦
❤6🤯5🤓1